Policies to enable serving untrusted services on alternative (non-3GPP) and untrusted access networks in EPS

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The popularity of mobile Internet is driving the Mobile world towards untrusted services while increasing Mobile Data volumes encourage adoption of untrusted access network for delivery of MNO services. This paper examines the emerging methods of utilizing untrusted access and facilitating untrusted third party services on either trusted or non-trusted access networks via existing and extended EPS facilities. These methods and policies should be better organized in an effort to manage a multi-access and open service environment, with heterogeneous access technologies and collaboration across business borders. This paper proposes enhancements to managing untrusted access, selection of best available access network and delivering sponsored services utilizing MNO's policies and authentication.

Original languageEnglish
Title of host publicationProceedings - 35th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 2011
Pages48-53
Number of pages6
DOIs
Publication statusPublished - 1 Nov 2011
Externally publishedYes
Event35th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 2011 - Munich, Germany
Duration: 18 Jul 201121 Jul 2011

Publication series

NameProceedings - International Computer Software and Applications Conference
ISSN (Print)0730-3157

Conference

Conference35th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 2011
Country/TerritoryGermany
CityMunich
Period18/07/1121/07/11

Keywords

  • ABC (Always Best Connected)
  • ANDSF
  • EPC
  • EPS
  • LTE
  • Non-3GPP
  • PCRF
  • PMIP
  • Policy
  • QoS
  • Untrusted access
  • WiFi
  • Wlan

Fingerprint

Dive into the research topics of 'Policies to enable serving untrusted services on alternative (non-3GPP) and untrusted access networks in EPS'. Together they form a unique fingerprint.

Cite this